Skip to content
Branch: master
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
92 lines (68 sloc) 2.84 KB


Travis CI GoDoc Github All Releases

For checking what collaborators, hooks, deploy keys, and protected branches you have added on all your GitHub repositories. This also scans all an organization's repos you have permission to view. Because nobody has enough RAM in their brain to remember this stuff for 100+ repos.

Check out genuinetools/pepper for setting all your GitHub repo's master branches to be protected. Pepper even has settings for organizations and a dry-run flag for the paranoid.

Table of Contents



For installation instructions from binaries please visit the Releases Page.

Via Go

$ go get


$ audit -h
audit -  Tool to audit what collaborators, hooks, and deploy keys are on your GitHub repositories.

Usage: audit <command>


  -d      enable debug logging (default: false)
  -owner  only audit repos the token owner owns (default: false)
  -orgs   specific orgs to check (e.g. 'genuinetools')
  -repo   specific repo to test (e.g. 'genuinetools/audit') (default: <none>)
  -token  GitHub API token (or env var GITHUB_TOKEN)


  version  Show the version information.
$ audit --token 12345
genuinetools/apk-file ->
        Hooks (1):
                travis - active:true (
        Protected Branches (1): master

genuinetools/apparmor-docs ->
        Keys (1):
                jenkins - ro:false (
        Unprotected Branches (1): master

genuinetools/bane ->
        Hooks (1):
                travis - active:true (
        Protected Branches (1): master

genuinetools/battery ->
        Hooks (1):
                travis - active:true (
        Protected Branches (1): master
        Unprotected Branches (1): WIP

genuinetools/irssi ->
	Collaborators (3): tianon, genuinetools, docker-library-bot
	Hooks (1):
		docker - active:true (
	Protected Branches (1): master
You can’t perform that action at this time.